Professional Cloud security Manager - Cloud Security Cloud Computing Vulnerabilities Vulnerability Vulnerabilities and Cloud Risk Cloud Computing Cloud Computing Core-Technology Vulnerabilities

Embed Size (px)

Text of Professional Cloud security Manager - Cloud Security Cloud Computing Vulnerabilities Vulnerability...

  • COURSE BROCHURE

    Professional Cloud Security Manager

    Training & Certification

  • The CCC Professional Cloud Security Manager (PCS) certification explores core concepts related to security, risk and compliance within the cloud computing environment.

    The certification enables candidates to apply the underpinning security concepts to an enterprise cloud computing environment.

    The risks and the impact of cloud computing must be understood in terms of both business and technical security challenges and their effect on business and technical governance and policy. The certification also presents the terminology used to describe security threats and issues in cloud computing.

    IT Security Professionals (ie. Security Engineers, Analysts and Architects)

    Risk and Compliance Professionals (ie. Risk Management, Audit and Compliance Managers)

    Auditors of Cloud Computing Services, Network Engineers/Administrators and Email

    System Administrators

    Who Should Attend?

    What is Professional Cloud Security Manager ?

  • At the end of this course, participants will be able to learn :

    Cloud Computing BasicsSecurity, Governance, and Risks in ITIT GovernanceCloud Computing SecuritySecurity and Compliance: A Shared ResponsibilityPhysical and Operations Security ConsiderationsRisk Management: A Shared Perspectivedentity and Access ManagementData Protection, Data Security LifecycleForensics in the CloudLegal and Regulatory LandscapeMonitoring: Providers and SubscribersSecurity Operations in the CloudNetwork Security Management in CloudBusiness Continuity,Disaster Recovery,Capacity and Performance Planning.Advanced cloud security management Practices

    Learning Objectives

    Explain what it takes to secure the different cloud computing services and deployment models.

    Explain design security regarding the cloud infrastructure, configurations, and applications running within a cloud computing environment.

    Explain, apply, and analyze how to manage access to cloud computing resources using accounts, users, and groups.

    Explain, apply, and analyze the ways of securing data, operating systems, and applications and overall infrastructure within the cloud.

    Benefit ofProfessional Cloud Security Manager

  • Course Contents

    Module 1. Course Introduction

    Module 2. Cloud Computing: Security, Governance, and Risks 2.1 Cloud Computing Basics Cloud Computing Primer: What is the Cloud Characteristics of Cloud Computing Cloud Service Models Cloud Deployment Models Cloud Reference Models Storage Workload Management Direct IO Access

    2.2 Security, Governance, and Risks in IT Information Security: Definition

    The CIA PrincipleSecurity ManagementAssets, Threats, Vulnerability, and RiskRisk AssessmentRisk Assessment Result MatrixExecutive Risk Treatment and Remediation Plan: ExampleSecurity AssessmentSecurity Management LifecycleReturn on (Security) InvestmentReturn on Security Investment: ExampleInformation Security Management System

    2.3 IT Governance

    Governance: DefinitionGovernance StructureIT Governance Practices and Standards

    2.4 Cloud Computing SecurityCloud Computing: Shared Security ResponsibilitySecurity Risk Elements by Service ModelsRisks to Consider in the CloudCIA Within the CloudMulti-TenancySecurity Risks Within Multi-Tenancy DesignCloud Risk ConsiderationsCloud Computing Security Reference ArchitectureConsumer: Cloud Computing Security Reference ArchitectureCloud Provider: Cloud Computing Security Reference Architecture

  • Course Contents

    Module 3. Physical and Operations Security: A Shared Responsibility3.1 Security and Compliance: A Shared Responsibility Shared Security in Layered Architecture Security is a Shared Responsibility Split or Dual Responsibility Cloud Security Reference Model Cloud Compliance Control Layers Compliance Controls Cloud Provider Security Benefits Cloud Subscriber Security Benefits Cloud Consumer: Security Review Service Level Agreements: Specification of Responsibilities Cloud Computing Model SLA Cloud Interconnection Security Agreement Common Cloud Computing Vendor Trust Currencies

    3.2 Physical and Operations Security Considerations

    Shared Security in Layered ArchitectureAuthentication and Authorization in the CloudAccountability and Responsibility in Respect to Cloud Providers and SubscribersConsiderations for Data TransferLoss of Control on DataData Protection Issues in the CloudData Security LifecycleData Locations, Transfer, and AccessConsiderations Across the Data LifecycleCloud Computing and Data Protection LawsVendor Lock-InInformation Security and DefenseDefense in Depth Within the CloudNetwork Considerations in Cloud Computing

    3.3 Risk Management: A Shared Perspective

    Assets Management in a Cloud EnvironmentThreat Model for Cloud Service DeploymentThreat Modeling in the CloudCloud Service Providers: Addressing Security and Risks in the CloudCloud Service Providers: Understanding the Risks and RewardsCloud Subscriber Risk Assessment: Evaluating the Risks and RewardsCloud Risk AssessmentRisk Acceptance and Risk Treatment PlanRisk Treatment SummaryCloud Vendor Management: Shared Security and Risks Assessments

  • Course Contents

    Module 4. Security Management Controls in Cloud Computing4.1 Identity and Access Management Identity and Access Management: Definition Controlling Access Types of Security Credentials in the Cloud Federated Identity Multi-Factor Authentication MFA in the Cloud Identity Hub/Store Federated Identity Technologies Security Considerations in Using Federated Identity Least Privilege Access Role-Based Access (Security Groups) in the Cloud Sample Security Groups in the Cloud Separation of Duties4.2 Data Protection Data Handling Data Protection: Primer Data Protection Requirements Data Security Standards International Data Protection Elements Data Governance Data Protection/Security Policy Data Classification: Overview Data Discovery Prior to Deploying to Cloud Data Classification Enablement Define Data Ownership Get the Users Involved: Start Classifying and Adding Metadata4.3 Data Security Lifecycle Data Security Defining Principle: Data Geo-Location is Not a Security Principle Data Security Lifecycle Components Process Integration: Data Protection - in Transit Process Integration: Data Protection - At Rest and in Use Unstructured Data Protection Hardware Security Module HSM in the Cloud4.4 Forensics in the Cloud Cloud Forensics Requirements for Forensics in the Cloud Forensics-Enabled Cloud

  • Course Contents

    Module 5. Legal, Contractual, and Operational Monitoring in Cloud

    5.1 Legal and Regulatory Landscape Cloud Computing: Legal Challenges Legal and Regulatory Landscape: Cloud Computing Legal and Regulatory Landscape: Major Considerations Initial Due Diligence: Cloud Computing Contracting Cloud Computing Checklist Examples of Questions to be Asked Due Diligence: Common Trust Currencies Third-Party Involvement Cloud Computing Contracts Contracts in the Cloud: Data Protection Contracts in the Cloud: Scope of Processing5.2 Monitoring: Providers and Subscribers Cloud Service Monitoring Cloud Computing Security Monitoring Cloud Continuous Monitoring Monitor Security and Performance of Applications Information Security Continuous Monitoring Interconnected Security Agreements5.3 Security Operations in the Cloud Security Operations Center in the Cloud Security Operations: A Shared Responsibility Concept of Operations: Cloud Service Provider Example of Cloud Computing CONOPS: FedRAMP CONOPS Cloud Service and System Hardening Cloud Service Providers Leading Practices: Hardening Cloud Service Subscribers Leading Practices: Hardening TOP SLA Factors: Security Perspective

    Module 6. Network Security Management in Cloud

    Traditional Network Management vs. Cloud Network ManagementCloud Computing Network EcosystemSoftware-Defined Networking (SDN)SDN Security ConsiderationsNetwork Service Virtualization (NSV)Virtualized Network: Security ChallengesSecurity Advantages of VirtualizationVirtual Infrastructure Security SecretsRole of HypervisorVirtualization Security Challenges/Attack VectorsCloud Network Security Management

    6.1 Network Management in the Cloud

  • Course Contents6.2 Vulnerability, Patch Management, and Pen-Testing Vulnerability Management Vulnerability Management in the Cloud Threat and Vulnerability Management Programs VM Platforms Understanding Cloud Computing Vulnerabilities Vulnerability Vulnerabilities and Cloud Risk Cloud Computing Cloud Computing Core-Technology Vulnerabilities Essential Cloud Characteristic Vulnerabilities Architectural Components and Vulnerabilities Penetration Testing

    6.3 Cloud Security Architecture

    Cloud Security Reference ArchitectureComposite Cloud Ecosystem Security ArchitectureService-oriented Modeling Practices

    Module 7. Business Continuity, Disaster Recovery, and Capacity/Performance Planning7.1 Business Continuity Business Continuity Considerations Rationale for Maintaining Business Continuity Management Plan Business Continuity Executions Business Impact Analysis (BIA)

Recommended

View more >